Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
oracle database server 11.1.0.7 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2009-1997
Unspecified vulnerability in the Authentication component in Oracle Database 10.2.0.3 and 11.1.0.7 allows remote malicious users to affect confidentiality via unknown vectors.
Oracle Database Server 10.2.0.3
Oracle Database Server 11.1.0.7
570
VMScore
CVE-2013-5771
Unspecified vulnerability in the XML Parser component in Oracle Database Server 11.1.0.7, 11.2.0.2, 11.2.0.3, and 12.1.0.1 allows remote malicious users to affect confidentiality and availability via unknown vectors.
Oracle Database Server 11.2.0.3
Oracle Database Server 11.2.0.2
Oracle Database Server 12.1.0.1
Oracle Database Server 11.1.0.7
356
VMScore
CVE-2013-5858
Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, and 12.1.0.1 allows remote authenticated users to affect integrity via unknown vectors, a different vulnerability than CVE-2015-0370.
Oracle Database Server 11.2.0.3
Oracle Database Server 11.2.0.4
Oracle Database Server 12.1.0.1
Oracle Database Server 11.1.0.7
445
VMScore
CVE-2013-3826
Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 11.1.0.7, 11.2.0.2, 11.2.0.3, and 12.1.0.1 allows remote malicious users to affect confidentiality via unknown vectors.
Oracle Database Server 11.2.0.3
Oracle Database Server 11.2.0.2
Oracle Database Server 12.1.0.1
Oracle Database Server 11.1.0.7
312
VMScore
CVE-2015-0370
Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, and 12.1.0.1 allows remote authenticated users to affect integrity via unknown vectors, a different vulnerability than CVE-2013-5858.
Oracle Database Server 11.2.0.4
Oracle Database Server 12.1.0.1
Oracle Database Server 11.1.0.7
Oracle Database Server 11.2.0.3
436
VMScore
CVE-2015-0371
Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, and 12.1.0.1 allows remote authenticated users to affect integrity and availability via unknown vectors.
Oracle Database Server 11.1.0.7
Oracle Database Server 12.1.0.1
Oracle Database Server 11.2.0.4
Oracle Database Server 11.2.0.3
530
VMScore
CVE-2010-2415
Unspecified vulnerability in the Change Data Capture component in Oracle Database Server 10.1.0.5, 10.2.0.4, 11.1.0.7, and 11.2.0.1 allows remote authenticated users to affect confidentiality and integrity, related to DBMS_CDC_PUBLISH.
Oracle Database Server 10.1.0.5
Oracle Database Server 10.2.0.4
Oracle Database Server 11.1.0.7
Oracle Database Server 11.2.0.1
578
VMScore
CVE-2010-2419
Unspecified vulnerability in the Java Virtual Machine component in Oracle Database Server 10.1.0.5, 10.2.0.4, 11.1.0.7, and 11.2.0.1 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
Oracle Database Server 11.1.0.7
Oracle Database Server 11.2.0.1
Oracle Database Server 10.1.0.5
Oracle Database Server 10.2.0.4
383
VMScore
CVE-2011-0805
Unspecified vulnerability in the UIX component in Oracle Database Server 10.1.0.5, 10.2.0.4, 11.1.0.7, and 11.2.0.1 allows remote malicious users to affect integrity via unknown vectors.
Oracle Database Server 11.2.0.1
Oracle Database Server 10.1.0.5
Oracle Database Server 11.1.0.7
Oracle Database Server 10.2.0.4
570
VMScore
CVE-2012-0510
Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, and 11.1.0.7 allows remote malicious users to affect integrity and availability via unknown vectors.
Oracle Database Server 10.2.0.4
Oracle Database Server 10.2.0.5
Oracle Database Server 10.2.0.3
Oracle Database Server 11.1.0.7
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32886
insecure direct object reference
CVE-2024-34342
file inclusion
CVE-2024-34562
CVE-2024-34347
CVE-2024-26026
CVE-2024-4647
unprivileged
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »